Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Firefighting drones Reviewing what makes a smart city smart
  • Big Data
    • How is Big Data influencing the recruitment process? Artificial Intelligence converts thoughts into speech
  • Cybersecurity
    • Four cyber security milestones that shaped the future of malware Cyber Security Weekly Briefing 22–29 April

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Telefónica Tech

Santiago Morante Cendrero

Deep Learning in Star Wars: May Computation Be With You

Today we are going to talk about how Artificial Intelligence and, Deep Learning in particular, are being used in the filming of movies and series, achieving better results in...
Cyber Security Weekly Briefing 8–14 january
Telefónica Tech

Cyber Security Weekly Briefing 8–14 january

Microsoft security bulletin Microsoft has published its January security bulletin in which it has fixed a total of 97 bugs, including six 0-day vulnerabilities and nine bugs classified as critical....
The risks of not having controlled exposure to information
Susana Alwasity

The risks of not having controlled exposure to information (I)

Welcome to the digital era. This is an era in which we embrace technology, with what it offers us in almost every sphere of our lives. From carrying a...
Carlos Martínez Miguel

Artificial Intelligence 2022: myths and realities

We are only in the early stages of AI development, but its impact is already huge When making predictions in the technological field, it is always advisable to start by...
Antonio Ramírez

The digitisation of predictive technology: digital twins

I still remember talking to my colleague Miguel Mateo after his presentation at the Telefónica Tech stand at MWC21 (Mobile World Congress 2021) about how the union of Predictive...
Cyber Security Weekly Briefing 4 – 7 january
Telefónica Tech

Cyber Security Weekly Briefing 1–7 january

Mail delivery failure on Microsoft Exchange on-premises servers 2 January, Microsoft released a workaround to fix a bug that interrupted email delivery on Microsoft Exchange on-premises servers. The bug is a “year...
Telefónica Tech

Cyber Security Weekly Briefing 28-31 december

Smishing campaign impersonating MRW and Sending using real order data Numerous Twitter users are reporting a smishing campaign in which the logistics companies Sending and MRW are being impersonated. The...
most readed contents 2021
Telefónica Tech

Most read content in 2021

The end of the year is approaching and from the Telefónica Tech blog we wanted to make a compilation of the contents that have most engaged our audience, technology...
Telefónica Tech

Cyber Security Weekly Briefing 18 – 24 December

Log4Shell Vulnerability (update) Through the week new details and comments around the vulnerability known as Log4Shell have continued to appear. First, a new denial-of-service vulnerability affecting Log4j2 on versions from 2.0-alpha1...
Jorge González

How can we make water consumption more efficient?

Thanks to new technologies that help connect objects or machines, such as NB-IoT or LTE-M, we can provide answers to how to optimise and make water consumption more efficient. Water...

Navegación de entradas

Previous articles
1 … 26 27 28 … 36
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration